استعرض 01 - مستودع الأصول الرقمية لأطروحات الدكتوراه ورسائل الماجستير حسب العنوان
الآن تُعرض المواد 21 -- 40 من 5153
-
Comparison of Axial and Radial Techniques for ICP-OES to Estimate Cadmium and Lead levels in whole Blood
(جامعة نايف العربية للعلوم الأمنية, 2020)The main question of the study: Which of the two analytical techniques under study is more accurate for the detection and quantification of cadmium and lead in human blood samples -
COMPREHENSIVE FEASIBILITY STUDY FOR THE IMPLANTED MEDICAL DEVICES RESPOND TO CYBERSECURITY THREATS
(جامعة نايف العربية للعلوم الأمنية, 2020)The main question of the study: The main question has crystallized in the fact that the risks and threats of cyberspace that may expose many patients who use these (IMD) devices to health complications and then endanger ... -
COMPUTATIONAL INTELLIGENT MECHANISM FOR BOOSTING CLUSTER-BASED WSN SECURITY
(جامعة نايف العربية للعلوم الأمنية, 2018-04-18)Abstract Wireless sensor networks (WSNs) is growing exponentially due to its utilization in numerous applications such as environmental monitoring, habitat monitoring, military, medical and health monitoring. WSNs are ... -
Computational Intelligent Mechanism for Boosting Cluster-Based WSN Security
(جامعة نايف العربية للعلوم الأمنية, 2018-04-17)Abstract Over the past few years' cloud computing has rapidly grown to a widely accepted IT model, and the dependency on the Internet technology has become an integral part of our life. governments and Organizations and ... -
Cybercrime in Progress -Theory and Prevention of - Enabled Offenses Technology
(جامعة نايف العربية للعلوم الأمنية, 2020)Background of study: Technology has become an integral part of our everyday lives. Today, the technological landscape is littered with devices of all shapes, sizes, and utilities, including mobile phones, tablet computers, ... -
Data security and Privacy Module in Cloud Computing
(جامعة نايف العربية للعلوم الأمنية, 2020)The main question of the study: What is the level of data security and privacy in cloud computing environments? -
Detection and Genotyping of STR loci in Saudi Breast Cancer Patients using Cell-free DNA (Cf-DNA)
(جامعة نايف العربية للعلوم الأمنية, 2017-06)Study Objectives: 1. Measure the Cf-DNA concentration in the plasma of breast cancer (BC) patients and healthy subjects. 2. Compare the concentration of plasma Cf-DNA in BC patients and healthy subjects, and evaluate ... -
Detection and quantification of 4-fluoro MDMB-BUTINACA in Herbal Products using GC-MS
(جامعة نايف العربية للعلوم الأمنية, 2021)The main question of the study: • Is it possible to quantitatively and qualitatively determine 4-fluoro MDMB-BUTINACA in herbal product? By Using methanol extraction method and GC-MS technic? • From this question two ... -
Detection of DDoS Attacks in Software Defined Networks
(جامعة نايف العربية للعلوم الأمنية, 2019-04-07)Abstract Due to its centralized and programmable simplicity, Software‐Defined Network (SDN) are considered as one of the most promising technologies for computer networks. There are many security issues in the traditional ... -
Detection of Violent Language Against Saudi Arabia in Social Media Using Deep Learning
(جامعة نايف العربية للعلوم الأمنية, 2020)The Main Question of The Study: Does the use of sequential model based on deep learning yield to accurate and effective detection of offensive Saudi Arabic language? -
Developing a Drug Delivery System for Pregabalin by Nanoparticles
(جامعة نايف العربية للعلوم الأمنية, 2018)Study Title: Developing a Drug Delivery System for Pregabalin by Nanoparticles. Student: Alanoud Mosa Alasiri Supervisor: Dr. Abdul-Rahman Al-Warthan Co-Supervisor: Dr. Abdul-Wali Ajlouni. Study Questions: Main ... -
Developing a Network-Based Botnet Detection Systems Using Machine Learning
(جامعة نايف العربية للعلوم الأمنية, 2019-03-31)Abstract: Botnet is considered a multifunctional malware. It can be leveraged by attackers to launch variety of malware attacks such as click fraud, DDOS, spam, etc. Moreover, the botnets pretend the normal traffic by ... -
Developing an Analytical Method for the Analysis of AMB-FUBINACA in Mice Brain using GC-MSMS
(جامعة نايف العربية للعلوم الأمنية, 2020)The main question of the study: Is it possible to determine the FUB-AMB quantitatively and qualitatively in mice brain tissue? From this question three key questions emerge: - How efficient is the extraction method of ... -
Developing Malware Detection System Based on Behavioral Aspects
(جامعة نايف العربية للعلوم الأمنية, 2018-04-18)Abstract Nowadays, the importance of malware analysis has become essential for the antivirus companies to detect various types of malware based on their finding, analyzing malware helps to assess damage, internet ... -
Developing Security Strategy for “Just Walk Out” Technology
(جامعة نايف العربية للعلوم الأمنية, 2019-04-06)On 2016, Amazon announced a new retail store: Amazon Go, the new type of store with no need to checkout. "Just Walk Out" technology is the name that amazon has launched on the technology used in its store. Amazon Go requires ... -
The Effect of Allogeneic Bone Marrow Transplant (allo-BMT) on Human Deoxyribonucleic Acid (DNA) Profiling
(2016)موضوع الدراسة: مقارنة بين السمات الوراثية من عينات الدم ومسحات الشدق ومسحات الجلد للمرضى الذين خضعوا لعملية زراعة النخاع العظمي. أهداف الدراسة: تهدف هذه الدراسة إلى: 1. تحديد الأنماط الوراثية للحمض النووي المستخلص من ... -
EFFECT OF EYE PATHOLOGY ON THE IRIS RECOGNITION SYSTEM
(جامعة نايف العربية للعلوم الأمنية, 2019-04-01)Nowadays, the application of biometric systems that aim to safeguard information and its supporting processes, systems and infrastructures are proliferating. Unfortunately, the iris recognition system has some weakness, ... -
The Effect of Medicinal Herbs "Calligonum Comosum" and" Sanna Alexandrina" in Saudi Environment on Breast Cancer Cell Lines (MDA-MB-231)
(جامعة نايف العربية للعلوم الأمنية, 2018-04-24)Research Problem: 1. What is the therapeutic effect of the medical herbs Calligonum comosum and Senna alexandrina on breast cancer cells represented by cancer cell line MDA-MB-231. 2. Does breast cancer cell line MDA-MB-231 ... -
AN EFFECTIVE ALGORITHM FOR DETECTING ATTACKS IN WIRELESS SENSOR NETWORK (WSN)
(2017)A Wireless Sensor Network (WSN) consists of sensor nodes which are deployed over a certain area for several applications. It is vulnerable to different types of attacks. Selective Forwarding and Black Hole attacks are two ... -
An Effective Awareness Model for Phishing Prevention
(جامعة نايف العربية للعلوم الأمنية, 2019-04-07)Phishing is a fraudulent action to obtain sensitive information such as usernames or personal information. It is one of a social engineering techniques being used to delude non-technical users. They are often lured by ...